Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures

Deliverables

Ecosystem report

This deliverable create an industrial ecosystem around the EnergyShield solution

Regulatory requirement specification

Regulatory requirements related to the deployment and operation of the EnergyShield toolkit

Dissemination report v2

second version

Societal Impact Report

Monitor and evaluate societal impact of the project

Integration and test plan

Integration and Testing Plan

Field trial evaluation summary report

Evaluation report on the performance of the EnergyShield solution

Dissemination report final

Dissemination report final version

Test/QA report

Testing plan document

Collaboration report

Develop crossfertilization activities with ongoing EU research projects and new Horizon 2020 projects focusing on similar challenges

Standardization report

This deliverables focuses on promoting EnergyShield results in standardization groups at both European level CENCENELECETSI and ISOIEC level

Business cases

Industrial business cases development for the EnergyShield toolkit including return on investment ROI and costbenefit analyses CBA

Communication report final

Communication report final version

Communication report v1

Communication report first version

Dissemination report v1

Dissemination report first version

Commercial requirement specification

Commercial requirements that can influence the market uptake of the EnergyShield solution, such as licensing model, pricing, modularity, etc.

Communication report v2

update version of the communication report

Updated security culture framework and tool - final version

The underlying Security Culture Framework will allow automated planning and implementation of security culture programmes. This will include a version update, including documentation.This deliverable will contain the updated from 2 iterations: M18 and M30

Updated security culture framework and tool

The underlying Security Culture Framework will allow automated planning and implementation of security culture programmes. This will include a version update, including documentation. This deliverable will be updated in 2 iterations: M18 and M30

Publications

Integrating Security Behavior into Attack Simulations

Author(s): Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi Psarrou
Published in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, Page(s) Pages 1–13
Publisher: ACM
DOI: 10.1145/3465481.3470475

TOWARDS ASSESSING CRITICAL INFRASTRUCTURES’ CYBER-SECURITY CULTURE DURING COVID-19 CRISIS: A TAILOR-MADE SURVEY

Author(s): Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis
Published in: 4th International Conference on Networks and Security (NSEC2020), Issue vol 10, 2020
Publisher: Aircconline

Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness

Author(s): Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Published in: ARES 2022: The 17th International Conference on Availability, Reliability and Security Vienna Austria, 2022, Page(s) Article No.: 77Pages 1–10, ISBN 978-1-4503-9670-7
Publisher: ACM
DOI: 10.1145/3538969.3543813

Modelling DoS Attacks & Interoperability in the Smart Grid

Author(s): Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg
Published in: 2020 29th International Conference on Computer Communications and Networks (ICCCN), Issue 3-6 Aug. 2020, 29th International Conference on Computer Communications and Networks (ICCCN), 2020, Page(s) 1-6, ISBN 978-1-7281-6607-0
Publisher: IEEE
DOI: 10.1109/icccn49398.2020.9209671

Why Phishing Works on Smartphones: A Preliminary Study

Author(s): Joakim Loxdal, Måns Andersson, Simon Hacks, Robert Lagerström
Published in: Proceedings of the 54th Hawaii International Conference on System Sciences, 2021, ISBN 978-0-9981331-4-0
Publisher: Hawaii International Conference on System Sciences
DOI: 10.24251/hicss.2021.863

Vulnerabilities Manager, a platform for linking vulnerability data sources

Author(s): Konstantinos Touloumis; Ariadni Michalitsi-Psarrou; Panagiotis Kapsalis; Anna Georgiadou; Dimitris Askounis
Published in: IEEE International Conference on Big Data, 2021, ISBN 978-1-6654-3902-2
Publisher: IEEE
DOI: 10.1109/bigdata52589.2021.9672026

Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness

Author(s): Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Published in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, Page(s) Pages 1–8, ISBN 978-1-4503-9670-7
Publisher: ACM
DOI: 10.1145/3538969.3544467

Enhancing SIEM Technology for protecting Electrical Power and Energy Sector

Author(s): Iosif Sklavidis; Christos Angelidis; Rosanna Babagiannou; Angelos Liapis
Published in: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, Page(s) pp. 473-478
Publisher: IEEE
DOI: 10.1109/csr51186.2021.9527944

Security Considerations for Remote Terminal Units

Author(s): Jose Eduardo Urrea Cabus; İsmail Bütün; Robert Lagerström
Published in: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), 2022, ISBN 978-1-6654-8374-2
Publisher: IEEE
DOI: 10.1109/zinc55034.2022.9840542

Towards Smart Sensing Systems: A New Approach to Environmental Monitoring Systems by Using LoRaWAN

Author(s): Junaid Qadir; Ismail Butun; Robert Lagerstrom; Paolo Gastaldo; Daniele D. Caviglia
Published in: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), 2022, ISBN 978-1-6654-8374-2
Publisher: IEEE
DOI: 10.1109/zinc55034.2022.9840717

Detecting Insider Threat via a Cyber-Security Culture Framework

Author(s): Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Published in: Journal of Computer Information Systems, 2021, Page(s) 1-11, ISSN 0887-4417
Publisher: International Association for Computer Information Systems
DOI: 10.1080/08874417.2021.1903367

Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

Author(s): Wenjun Xiong, Emeline Legrand, Oscar Åberg, Robert Lagerström
Published in: Software and Systems Modeling, 2021, ISSN 1619-1366
Publisher: Springer Verlag
DOI: 10.1007/s10270-021-00898-7

Working from home during COVID-19 crisis: a cyber security culture assessment survey

Author(s): Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Published in: Security Journal, Issue Security Journal, 2021, ISSN 0955-1662
Publisher: Palgrave Macmillan Ltd.
DOI: 10.1057/s41284-021-00286-2

Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework

Author(s): Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Published in: Sensors, Issue 21/9, 2021, Page(s) 3267, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21093267

Hospitals' Cybersecurity Culture during the COVID-19 Crisis

Author(s): Georgiadou, A.; Michalitsi-Psarrou, A.; Gioulekas, F.; Stamatiadis, E.; Tzikas, A.; Gounaris, K.; Doukas, G.; Ntanos, C.; Landeiro Ribeiro, L.; Askounis, D. Hospitals
Published in: MDPI, Issue 22279032, 2021, ISSN 2227-9032
Publisher: MDPI
DOI: 10.3390/healthcare9101335

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis

Author(s): Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece
Published in: International Journal of Network Security and its Application (IJNSA), Issue Volume 13, No.1, 2021, ISSN 0974-9330
Publisher: IJNSA

Modelling smart grid IT-OT dependencies for DDoS impact propagation

Author(s): DilaraAcarali, K.Rajesh Rao, MuttukrishnanRajarajan, DoronChema, MarkGinzburg
Published in: Computers & Security, Issue 01674048, 2021, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102528

Two decades of cyberattack simulations: A systematic literature review

Author(s): ViktorEngström, RobertLagerström
Published in: Computers & Security, Issue 01674048, 2022, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102681

Automating threat modeling using an ontology framework

Author(s): Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström
Published in: Cybersecurity, Issue 3/1, 2020, ISSN 2523-3246
Publisher: SpringerOPen
DOI: 10.1186/s42400-020-00060-8

A Cyber-Security Culture Framework for Assessing Organization Readiness

Author(s): Anna Georgiadou, Spiros Mouzakitis, Kanaris Bounas, Dimitrios Askounis
Published in: Journal of Computer Information Systems, 2020, Page(s) 1-11, ISSN 0887-4417
Publisher: International Association for Computer Information Systems
DOI: 10.1080/08874417.2020.1845583

FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain

Author(s): Akanksha Dixit; Arjun Singh; Yogachandran Rahulamathavan; Muttukrishnan Rajarajan
Published in: IEEE Internet of Things Journal, Issue 23274662, 2021, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/jiot.2021.3120640

A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures.

Author(s): Gioulekas, F.; Stamatiadis, E.; Tzikas, A.; Gounaris, K.; Georgiadou, A.; Michalitsi-Psarrou, A.; Doukas, G.; Kontoulis, M.; Nikoloudakis, Y.; Marin, S.; Cabecinha, R.; Ntanos, C.
Published in: Healthcare, Issue 22279032, 2022, ISSN 2227-9032
Publisher: MDPI
DOI: 10.3390/healthcare10020327

powerLang: a probabilistic attack simulation language for the power domain

Author(s): Simon Hacks, Sotirios Katsikeas, Engla Ling, Robert Lagerström, Mathias Ekstedt
Published in: Energy Informatics, Issue 3/1, 2020, ISSN 2520-8942
Publisher: Springer Link
DOI: 10.1186/s42162-020-00134-4

A Method for Assigning Probability Distributions in Attack Simulation Languages

Author(s): Wenjun Xiong, Simon Hacks, Robert Lagerström
Published in: Complex Systems Informatics and Modeling Quarterly, Issue 26, 2021, Page(s) 55-77, ISSN 2255-9922
Publisher: Complex Systems Informatics and Modeling Quarterly
DOI: 10.7250/csimq.2021-26.04

A probabilistic attack simulation language for the IT domain

Author(s): Sotirios Katsikea, Simon Hacks, Pontus Johnson, Mathias Eksted, Robert Lagerstrom, Joar Jacobsson, Max Wallstedt, Per Eliasson
Published in: GraMSec@CSF, 2020
Publisher: GraMSec@CSF

Towards Measuring Test Coverage of Attack Simulations

Author(s): Nicklas Hersén, Simon Hacks, Konrad Fögen
Published in: Enterprise, Business-Process and Information Systems Modeling - 22nd International Conference, BPMDS 2021, and 26th International Conference, EMMSAD 2021, Held at CAiSE 2021, Melbourne, VIC, Australia, June 28–29, 2021, Proceedings, Issue 421, 2021, Page(s) 303-317, ISBN 978-3-030-79185-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-79186-5_20

Towards an Ecosystem of Domain Specific Languages for Threat Modeling

Author(s): Simon Hacks, Sotirios Katsikeas
Published in: Advanced Information Systems Engineering - 33rd International Conference, CAiSE 2021, Melbourne, VIC, Australia, June 28 – July 2, 2021, Proceedings, Issue 12751, 2021, Page(s) 3-18, ISBN 978-3-030-79381-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-79382-1_1

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience

Author(s): Butun, Ismail & Sari, Alparslan
Published in: Smart Grid, Factories, and Cities, Chapter: Early Detection and Recovery Measures for Smart Grid Cyber-Resilience, 2021
Publisher: IGI
DOI: 10.4018/978-1-7998-7468-3.ch005

Correction to: A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain

Author(s): Engla Ling, Robert Lagerström, Mathias Ekstedt
Published in: Critical Information Infrastructures Security - 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings, Issue 12332, 2020, Page(s) C1-C1, ISBN 978-3-030-58294-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-58295-1_8

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available